speakerNEW!iShredder™ Business for iOS and Android are now available for Enterprise users.Learn more

Svchost.rar

: Security software, such as Malwarebytes , often flags these files for quarantine or deletion upon discovery. Indicator of Compromise (IoC) Patterns Command/Trace Extraction tar -xvf svchost.rar Forensic Cleanup del /f /q svchost.rar Related Payloads GITSHELLPAD, GOSHELL, Cobalt Strike Beacon Recommendations

: Analysis on platforms like ANY.RUN has tagged variants of this archive with the Quasar RAT .

: After the internal tools are deployed, the command del /f /q svchost.rar is often issued to remove forensic traces. svchost.rar

Analysis of the file reveals it is a malicious archive frequently used in Advanced Persistent Threat (APT) campaigns to deploy remote access tools and steal data. Executive Summary

: Immediately disconnect any machine where this file was detected from the network. : Security software, such as Malwarebytes , often

: Check for related malicious processes or scheduled tasks that may have been established after the archive was extracted.

: The archive is pulled from a command-and-control (C2) server. Analysis of the file reveals it is a

: The actor uses the command tar -xvf svchost.rar to extract post-compromise tools.